An Embedded Fingerprint Authentication System Integrated with a Hardware-Based Truly Random Number Generator

  • Murat Erat
  • Kenan Danışman
  • Salih Ergün
  • Alper Kanak
  • Mehmet Kayaoglu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4673)


Recent advances in information security requires randomly selected strong keys. Most of these keys are generated by software-based random number generators. However, implementing a Truly Random Number Generator (TRNG) without using a hardware-supported platform is not reliable. In this paper, a fingerprint authentication system using a hardware-based TRNG to produce a private key that encrypts the fingerprint template of a person is presented. The designed hardware can easily be mounted on a standard or embedded PC via its PCI interface to produce random number keys. Random numbers forming the private key is guaranteed to be true because it passes a two-level randomness test evaluated first on the FPGA then on the PC by applying the full NIST test suite. The whole system implements an AES-based encryption scheme to store the person’s secret stored on a smart or glossary card safely. The main contribution of the work is the use of new-generation hardware-based TRNGs to enhance the security of a fingerprint authentication system.


Random Number Generator Authentication Scheme Advance Encryption Standard Authentication System Fast Oscillator 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bucci, M., Germani, L., Luzzi, R., Trifiletti, A., Varanonuovo, M.: A High Speed Oscillator-based Truly Random Number Source for Cryptographic Applications on a SmartCard IC. IEEE Trans. Comput. 52, 403–409 (2003)CrossRefGoogle Scholar
  2. 2.
    Petrie, C.S., Connelly, J.A.: A Noise-Based IC Random Number Generator for Applications in Cryptography. IEEE Trans. Circuits & Systems I 47(5), 615–621 (2000)CrossRefGoogle Scholar
  3. 3.
    Jun, B., Kocher, P.: The Intel Random Number Generator. Cryptography Research, Inc. white paper prepared for Inter Corp. (1999),
  4. 4.
    Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptology. CRC Press, Boca Raton, USA (1996)Google Scholar
  5. 5.
    Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons Ltd, West Sussex, England (1996)Google Scholar
  6. 6.
    Holman, W.T., Connelly, J.A., Downlatabadi, A.B.: An Integrated Analog-Digital Random Noise Source. IEEE Trans. Circuits & Systems I 44(6), 521–528 (1997)CrossRefGoogle Scholar
  7. 7.
    Bagini, V., Bucci, M.: A Design of Reliable True Random Number Generator for Cryptographic Applications. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 204–218. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  8. 8.
    Stojanovski, T., Kocarev, L.: Chaos-Based Random Number Generators-Part I: Analysis. IEEE Trans. Circuits & Systems I 48(3), 281–288 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Delgado-Restituto, M., Medeiro, F., Rodriguez-Vazquez, A.: Nonlinear Switched-current CMOS IC for Random Signal Generation. Electronics Letters 29(25), 2190–2191 (1993)CrossRefGoogle Scholar
  10. 10.
    Yalcin, M.E., Suykens, J.A.K., Vandewalle, J.: True Random Bit Generation from a Double Scroll Attractor. IEEE Trans. on Circuits & Systems I: Fundamental Theory and Applications 51(7), 1395–1404 (2004)CrossRefMathSciNetGoogle Scholar
  11. 11.
    Von Neumann, J.: Various Techniques Used in Connection With Random Digits. In: Forsythe, G.E.(ed.) National Bureau of Standards, Applied Math Series - Notes, vol. 12, pp. 36–38 (1951)Google Scholar
  12. 12.
    National Institute of Standard and Technology.: A Statistical Test Suite for Random and Pseudo Random Number Generators for Cryptographic Applications. NIST 800-22 (2001),
  13. 13.
    Chikkerur, S., Cartwright, A.N., Govindaraju, V.: Fingerprint Enhancement Using STFT Analysis. Jour. Pattern Recogn. 40(1), 198–211 (2007)zbMATHCrossRefGoogle Scholar
  14. 14.
    Erat, M., Danisman, K., Ergun, S., Kanak, A.: A Hardware-Implemented Truly Random Key Generator for Secure Biometric Authentication Systems. In: Gunsel, B., Jain, A.K., Tekalp, A.M., Sankur, B. (eds.) MRCS 2006. LNCS, vol. 4105, pp. 128–135. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  15. 15.
    Maio, D., Maltoni, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)zbMATHGoogle Scholar
  16. 16.
    Willis, A.J., Myers, L.: A Cost-effective fingerprint Recognition system for Use with Low-quality Prints and Damaged Fingertips. Jour. Pattern Recogn. 34, 255–270 (2001)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Murat Erat
    • 1
    • 2
  • Kenan Danışman
    • 2
  • Salih Ergün
    • 1
  • Alper Kanak
    • 1
  • Mehmet Kayaoglu
    • 1
  1. 1.TÜBİTAK-National Research Institute of Electronics and Cryptology, Kocaeli, Turkiye 
  2. 2.Dept. of Electronics Engineering, Erciyes University, Kayseri, Turkiye 

Personalised recommendations